Search Networking
Login Register
Explore the Network
  • TechTarget Network
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
  • Search Networking
    • Cloud & Data Center
    • Infrastructure
    • Management
    • Mobile & Wireless
    • Network Security
    • More Topics
      • Networking Careers & Certifications
      • Strategy & Planning
      • WAN
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

Management Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is multi-access edge computing? Benefits and use cases
  • What is 5G?
  • What is a small cell in wireless networks?
  • What is 6G? Overview of 6G networks & technology
  • phase-locked loop (PLL)
Latest TechTarget resources
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
Search Unified Communications
  • Why IT leaders must prioritize hybrid work accessibility

    As companies push return-to-office policies, IT leaders must ensure disabled employees aren't left behind. Explore how AI enables...

  • Mitel elevates hybrid cloud control with Edge and WX

    Mitel Edge and WX enable organizations to maintain control of critical systems while taking advantage of AI for streamlined ...

  • Zoom integrates agentic AI across platform portfolio

    AI Companion 3.0 is breaking down communications silos across meetings, calls, chat and contact center. New custom AI agents also...

Search Mobile Computing
  • How to detect and remove malware from an iPhone

    iPhones are not immune to malware. Learn the warning signs, removal steps and prevention controls IT teams can use to protect ...

  • Navigating app protection policies with Intune MAM

    With Intune MAM, IT leaders can enforce app‑level protection policies that secure corporate data across devices while maintaining...

  • Understanding MDM vs. MAM in Microsoft Intune

    Microsoft Intune supports MDM and MAM, two distinct approaches to managing devices and protecting data across corporate-owned and...

Search Data Center
  • How to secure the data center's expanding attack surface

    CIOs must adapt to an expanding data center attack surface by securing all IT access points and adopting zero trust networks and ...

  • Decarbonizing data centers: Turning sustainability into strategy

    As energy costs rise and regulations tighten, IT leaders must focus on decarbonizing data centers and turning sustainability ...

  • Data center cooling systems and technologies and how they work

    Extreme heat and cold can keep equipment from operating at peak efficiency. Explore cost-efficient and cost-effective cooling ...

Search ITChannel
  • Geography, skills drive IT Services M&A for Presidio, Accenture

    Presidio has acquired transACT Technology Solutions, a digital transformation specialist based in the United Kingdom, while ...

  • Consultants, SIs back AWS agentic AI marketplace launch

    Accenture, Cognizant and Deloitte are among the partners with offerings on AWS' AI Agents and Tools marketplace, which is ...

  • Partners begin to target agentic AI marketplace platforms

    Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close